Author Archives: Admin
2011 Cost of a Data Breach Reports, by Symantec and Ponemon
Symantec has published their latest 2011 results on the Cost of Data Breach series. Companies analyzed were from 14 different industries including finance, retail, healthcare, services, education, technology, manufacturing, research, transportation, consumer, hotels and leisure, media, pharmaceutical and communications. Reports … Continue reading
Data Breach Investigations Reports, by Verizon
Verizon has recently published their latest (2012) Investigations Report. The reports are available on their site. Here below is one extract from the report. It is worth to go through.
Information Security, course material by M. Stamp
Mark Stamp has made Information Security course material available (from 2011). I highly recommend to use these courses which are available via internet. The book related to his course is called “Information Security: Principles and Practice“. Good place to start … Continue reading
LTE deployment maps, and some links
LTE is the technology which makes mobile broad band possible. Definitions LTE by wikipedia 3GPP Long Term Evolution, referred to as LTE and marketed as 4G LTE, is a standard for wireless communication of high-speed data for mobile phones and … Continue reading
Holographic images are already in use
Will the holographic images change our way of living? Check out the videos below to get an idea… Holographic images in big scale: Celine Dion Holograms Caesar’s Palace 3D Holographic Fashion Show in Hamburg Burberry’s Beijing Digital Fashion Show Adidas … Continue reading
self-balancing U3-X electric unicycle, by Honda
Honda has developed a self-balancing one-wheeled electric vehicle called U3-X. Top speed 6 km/h Weight: 10 kg Autonomy: 1 hour Examples of a two-wheeled vehicles are from Segway and Toyota: Video Check out the video to get an … Continue reading
Network Security and Forensics lectures by Buchanan
Bill Buchanan is a Professor at Edinburgh Napier University (UK), and he has made several lectures available in Network Security and Forensics. I highly recommend this material to anyone. Book Related track “Security and Network Forensics” The book from 2011 … Continue reading